TITLE: Hummingbird Collaboration Script Insertion and Information Disclosure SECUNIA ADVISORY ID: SA18411 VERIFY ADVISORY: http://secunia.com/advisories/18411/ CRITICAL: Less critical IMPACT: Cross Site Scripting, Spoofing, Exposure of system information WHERE: >From remote SOFTWARE: Hummingbird Collaboration 5.x http://secunia.com/product/6777/ DESCRIPTION: Secure Network has reported a vulnerability and a weakness in Hummingbird Collaboration, which can be exploited by malicious users to disclose system information and conduct script insertion attacks. 1) An input validation error in the file manager utility can be exploited to upload an HTML document containing arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious HTML document is viewed. It has also been reported that users may be tricked into downloading malicious files by manipulating certain parameters in the URL. 2) The problem is that the internal IP of the server may be included in a cookie sent to the user. Some other system information may also be included in responses sent from the application. The vulnerability and the weakness have been reported in version 5.2.1 and prior. Other versions may also be affected. SOLUTION: The vulnerability and the weakness have reportedly been fixed by the vendor. PROVIDED AND/OR DISCOVERED BY: Luca Carettoni and Federico Maggi, Secure Network ORIGINAL ADVISORY: http://www.securenetwork.it/advisories/sn-2006-01.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------